Secure Software Design and Testing
Module 2 Exam Questions With 100%
Verified Answers
In secure software testing, which one of the following do
automated code review tools help to discover?
Select one:
a. Isolated implementations
b. Lack of exceptions
c. Content mutations
d. Traceability -
correct answer ✅b. Lack of exceptions
Regarding secure software development, __________ provide
developers with a foundation of consistent guidelines that can be
selectively chosen to fit the requirements and applicability of a
project instead of chosen based on individual preferences.
Select one:
a. Coding standards
b. Mission requirements
c. Access controls
,Secure Software Design and Testing
Module 2 Exam Questions With 100%
Verified Answers
d. Business expectations -
correct answer ✅a. Coding standards
From a secure software developer's perspective, a security model
does NOT help in which of the following tasks?
Select one:
a. Determining software functionality.
b. Designing a secure software architecture.
c. Verifying that the code will meet specifications.
d. Finding errors and vulnerabilities in design. -
correct answer ✅b. Designing a secure software architecture.
In the course of selecting an effective programming language,
languages that are ________ should not be used by software when
security is a necessity.
Select one:
a. At risk of buffer overflows
b. Compromised by SQl injection
, Secure Software Design and Testing
Module 2 Exam Questions With 100%
Verified Answers
c. Above the physical level
d. Below the application level -
correct answer ✅d. Below the application level
An important goal to meet when designing efficient, secure
software is to __________.
Select one:
a. Create the design understanding that the specifications will be
expanded until the project is deployed.
b. Allow for additional functions to remain in the software so they
may be used later.
c. Determine the amount of time it will take to complete the
design.
d. Create the design with an understanding that the initial security
measures may fail due to new attacks or vulnerabilities. -
correct answer ✅d. Create the design with an understanding that
the initial security measures may fail due to new attacks or
vulnerabilities.
Module 2 Exam Questions With 100%
Verified Answers
In secure software testing, which one of the following do
automated code review tools help to discover?
Select one:
a. Isolated implementations
b. Lack of exceptions
c. Content mutations
d. Traceability -
correct answer ✅b. Lack of exceptions
Regarding secure software development, __________ provide
developers with a foundation of consistent guidelines that can be
selectively chosen to fit the requirements and applicability of a
project instead of chosen based on individual preferences.
Select one:
a. Coding standards
b. Mission requirements
c. Access controls
,Secure Software Design and Testing
Module 2 Exam Questions With 100%
Verified Answers
d. Business expectations -
correct answer ✅a. Coding standards
From a secure software developer's perspective, a security model
does NOT help in which of the following tasks?
Select one:
a. Determining software functionality.
b. Designing a secure software architecture.
c. Verifying that the code will meet specifications.
d. Finding errors and vulnerabilities in design. -
correct answer ✅b. Designing a secure software architecture.
In the course of selecting an effective programming language,
languages that are ________ should not be used by software when
security is a necessity.
Select one:
a. At risk of buffer overflows
b. Compromised by SQl injection
, Secure Software Design and Testing
Module 2 Exam Questions With 100%
Verified Answers
c. Above the physical level
d. Below the application level -
correct answer ✅d. Below the application level
An important goal to meet when designing efficient, secure
software is to __________.
Select one:
a. Create the design understanding that the specifications will be
expanded until the project is deployed.
b. Allow for additional functions to remain in the software so they
may be used later.
c. Determine the amount of time it will take to complete the
design.
d. Create the design with an understanding that the initial security
measures may fail due to new attacks or vulnerabilities. -
correct answer ✅d. Create the design with an understanding that
the initial security measures may fail due to new attacks or
vulnerabilities.